OSINT Tools Worth Sharing

P { margin-bottom: 0.08in; }A:link { }
Open source intelligence is the next
big thing, it will change the processes and systems of current
intelligence structure. By looking at broader perspective, we can
easily find the application of OSINT from business intelligence to
security agencies, in short marketing firms, media houses, hackers,
security and military agencies blah blah blah can get benefits out of
from OSINT. But how, when and where to use OSINT ? This is actually a
topic to discuss because if you have a weapon but you don’t know how,
when and where to use, then believe me this weapon is useless.
The answer of how to use open source
intelligence is hidden on the tools and techniques, so in this
article we will cover some great tools that are available in the
market; and you can utilize them to make your hacking practice
efficient (if you know what I mean). Some of the tools listed below
are available on Kali Linux (the successor of backtrack) but if you
are using any other distribution or even Windows OS then you can
download and use them.

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


Maltego is the tool that can gather
information (believe me, it can gather). Maltego is a unique platform
developed to deliver a clear threat picture to the environment that
an organization owns and operates. Maltego’s unique advantage is to
demonstrate the complexity and severity of single points of failure
as well as trust relationships that exist currently within the scope
of your infrastructure. 

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


SHODAN is a search engine that lets you
find specific computers (routers, servers, etc.) using a variety of
filters. Some have also described it as a public port scan directory
or a search engine of banners.

H3 { margin-bottom: 0.08in; }H3.western { font-family: “Liberation Sans”,sans-serif; }H3.cjk { font-family: “Droid Sans”; }H3.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }


theHarvester is intended to help Penetration testers in the early
stages of the penetration test in order to understand the customer
footprint on the Internet. It is also useful for anyone that wants to
know what an attacker can see about their organization.

The objective of this program is to gather emails, subdomains,
hosts, employee names, open ports and banners from different public
sources like search engines, PGP key servers and SHODAN computer

Now we want to know about your favorite tool, it might be possible that you would not find your tool in the list aforementioned list; but it is not a big deal because it is not a final list. You can share the best tools other than mentioned one. I personally like and enjoy thehavester and maltego, what do you like most ?

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

OSINT WIFI Tutorial: Track People using WiFi via Wigle

Due to the drastic growth of internet access, Wi-fi networks have become progressively popular. Wi-fi technologies link to the network topologies allows users to...

Why Attack Surface Analysis is a Core of Cybersecurity?

The pandemic of COVID-19 has changed the world dramatically. Almost all everyday actions have gone online: people work from home, students attend lectures through...

The Attack Surface Mapping guide for Ethical Hackers

This article explains how to map the attack surface in a precise and realistic way. An attack surface aims to figure out which areas...

Addressing Myths About Online Casinos & Security

Many people carry a perception that online casinos inherently involve a security risk. The sense is that these sites can be somehow “sketchy” or...